What is Cyberstalking? Watch Katie's true story on cyberstalking--You Tube
"Katie is now the WWK's Spokesperson & Ambassador to Youth. She shares her powerful first hand testimony with other young teens and parents so they know that what happened to her and her family can happen to them. She is sought after for television, radio and print interviews and has testified before state congressional hearings".
Definitions of Cyberstalking
"Although no universally accepted definition exists, it is generally consideredas use of the Internet, e-mail or other electronic communications device to stalk or harass a person. Stalking is defined as repeated harassing or threatening behavior". --Cyber Angels
According to Wikipedia; cyberstalking is a "continual process" that is characterized by; "malice,
premeditation, repetition, distress, obsession, vendetta, no legitimate purpose, personally directed, disregarded warnings to stop, harassment, and threats".
What are the Actions of a Cyberstalker?
This form of harassment comes in many ways.The following list gives us some ideas from Wikipedia.
1. False accusations - Many cyberstalkers try to damage the reputation of the victim and turn other people against them. They may set up their own websites, blogs or user pages for the purpose of spreading false information about their victim. Additionally they may post allegations about the victim to newsgroups, chat rooms or other sits that allow public contributions, such as Wikipedia or Amazon.com.
2. Gather information- Cyberstalkers may approach heir victim's friends, family and work collegagus to obtain personal information. They will often monitor the victims online activities and attempt to rat their IP address in an effort to gather more information about their victims.
3. Encouraging Others- May cyberstakers try to involve thrid parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit.
4. False victimizaion- The cyberstalker will claim that the victim is harassing him or her.
5. Attacks on data an equipment- Stalkers may try to damage the victim's computer by sending viruses.
6. Ordering for others- They order items or subscribe to magazines in the victim's name. These often involve subscriptions to pornography and other explicit material that is sent to the victim's home or workplace.
Can I prevent this from happening to me?
This form of harassment is not preventable but these simple procedures may help avoid this problem:
1. Don't write when you're angry. To avoid inflaming others do not vent on the Internet. Remember that what you post can be read by many hundreds of others and it can be altered in many forms.
2. Stay away from questionable chat rooms and blogs.
3. Avoid speaking to strangers online.
4. Make sure that none of your online profiles contain any personal identification such as; your age, sex, school, address, home and cell phone numbers, team or teams you play on, activities your participate in, and where you work.
5. Never reply back to any form of harassment with an angry reply. Simply tell them to leave you alone. What I can do if I think I'm being
stalked or harassed? Contact an authority.
Speak to your parents, teachers, administrators, and counselors.
Save and print all forms of evidence Document times and sites where and when the incident occurred.
These websites offer advice that may be helpful if you find yourself in this situation:
Stalking can escalate to genuine danger.
If a stalker has made threats or crossed the line from online to offline contact, contact law enforcement.
Do not disregard such behavior, hoping it will simply stop. This is a matter of your personal safety.
Schools
Schools information- Book seminars at your school with Teen Angels Teen Angels
Educators guide to cyberbullying and cyber threats WCS
Educators- Are we responsible to teach and model this subject? Doug Johnson Parents
Parent questions on "FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT" -Teen Angels
Parent tips on what cyberstaking is and how to prevent it. Symantec Internet safety awareness and statistics Web Wise
Internet safety agreement contract between parent and child- Safe Teens
Students
Cyberstalking and harassment handouts for students under 18- Wired Safety
Articles for teens on cyberstalking and harassment Safe Teens
The Internet and your social life (My Space, Ebo, Avitars, blogs, etc)--Watch this discussion by teens about teens-- You Tube and Web Wise
At our Online Behavior Forum, you can share your own experiences or pose questions for others to consider.
Cyberstalking
What is Cyberstalking?
Watch Katie's true story on cyberstalking--You Tube
"Katie is now the WWK's Spokesperson & Ambassador to Youth. She shares her powerful first hand testimony with other young teens and parents so they know that what happened to her and her family can happen to them. She is sought after for television, radio and print interviews and has testified before state congressional hearings".
Definitions of Cyberstalking
"Although no universally accepted definition exists, it is generally considered as use of the Internet, e-mail or other electronic communications device to stalk or harass a person. Stalking is defined as repeated harassing or threatening behavior". --Cyber AngelsAccording to Wikipedia; cyberstalking is a "continual process" that is characterized by; "malice,
premeditation , repetition, distress, obsession, vendetta, no legitimate purpose, personally directed, disregarded warnings to stop, harassment, and threats".
What are the Actions of a Cyberstalker?
This form of harassment comes in many ways.The following list gives us some ideas from Wikipedia.
1. False accusations - Many cyberstalkers try to damage the reputation of the victim and turn other people against them. They may set up their own websites, blogs or user pages for the purpose of spreading false information about their victim. Additionally they may post allegations about the victim to newsgroups, chat rooms or other sits that allow public contributions, such as Wikipedia or Amazon.com.
2. Gather information- Cyberstalkers may approach heir victim's friends, family and work collegagus to obtain personal information. They will often monitor the victims online activities and attempt to rat their IP address in an effort to gather more information about their victims.
3. Encouraging Others- May cyberstakers try to involve thrid parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit.
4. False victimizaion- The cyberstalker will claim that the victim is harassing him or her.
5. Attacks on data an equipment- Stalkers may try to damage the victim's computer by sending viruses.
6. Ordering for others- They order items or subscribe to magazines in the victim's name. These often involve subscriptions to pornography and other explicit material that is sent to the victim's home or workplace.
Can I prevent this from happening to me?
This form of harassment is not preventable but these simple procedures may help avoid this problem:
1. Don't write when you're angry. To avoid inflaming others do not vent on the Internet. Remember that what you post can be read by many hundreds of others and it can be altered in many forms.
2. Stay away from questionable chat rooms and blogs.
3. Avoid speaking to strangers online.
4. Make sure that none of your online profiles contain any personal identification such as; your age, sex, school, address, home and cell phone numbers, team or teams you play on, activities your participate in, and where you work.
5. Never reply back to any form of harassment with an angry reply. Simply tell them to leave you alone.
What I can do if I think I'm being
stalked or harassed?
Contact an authority.
Speak to your parents, teachers, administrators, and counselors.
Save and print all forms of evidence Document times and sites where and when the incident occurred.
These websites offer advice that may be helpful if you find yourself in this situation:
Basic solutions
Cyber Angels
Watch this video for common solutions for adults 18 and older Wired Safety
Report Form on cyberstaking, cyberbullying, and Harassment
Wired Safety
Legal Information and Law Enforcement
Cyber Law Enforcement
Stalking can escalate to genuine danger.
If a stalker has made threats or crossed the line from online to offline contact, contact law enforcement.
Do not disregard such behavior, hoping it will simply stop. This is a matter of your personal safety.
Online and Mobile Safety Tips
Cell phone safety- Wired Safety
Chat room safety- Wired Safety
Instant Messaging Safety- Wired Safety
Online gaming safety- Wired Safety
Resources for Students, Parents, and Schools
Schools
Schools information- Book seminars at your school with Teen Angels Teen Angels
Educators guide to cyberbullying and cyber threats WCS
Educators- Are we responsible to teach and model this subject? Doug Johnson
Parents
Parent questions on "FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT" -Teen Angels
Parent tips on what cyberstaking is and how to prevent it. Symantec
Internet safety awareness and statistics Web Wise
Internet safety agreement contract between parent and child- Safe Teens
Students
Cyberstalking and harassment handouts for students under 18- Wired Safety
Articles for teens on cyberstalking and harassment Safe Teens
The Internet and your social life (My Space, Ebo, Avitars, blogs, etc)--Watch this discussion by teens about teens-- You Tube and Web Wise
At our Online Behavior Forum, you can share your own experiences or pose questions for others to consider.